Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Threat Actors Want Access to Your SDLC -- Here's How to Secure Them Mandeep Singh (Sonatype), Tim Vrablik (Sonatype) Bad actors are increasingly finding new ways to disrupt the software development supply chain. Whether via dependency confusion, typosquatting, or mal... June 8, 2023 11:00am Ensuring data privacy and compliance for ultra-high net worth families Josh Kanter, Founder & CEO of leafplanner, Bob Lam, Co-Founder & CEO of ShardSecure leafplanner offers a SaaS solution that empowers high-net-worth families to prepare for the future. leafplanner’s application creates a dynamic, regul... June 8, 2023 6:00pm Ep 7 - Integrating WAF into DevSecOps Practices Andrew Cheng Senior Solutions Engineer - F5 and Patrick Zoller Security Solutions Architect - F5 The fact that application attacks are on the rise is a growing concern for business leaders, as applications are the gateway to an organisation's most... 4 days ago | 74 mins Deconstructing and analyzing Tabby and Notepad ++ Software Packages Tim Stahl, Director of Field Threat Engineering, ReversingLabs The tools we use every day, especially common open source tools, tend to be an overlooked link in the software supply chain. Performing third party ri... 2 weeks ago | 26 mins Easily Stop Malware, Before Your Company Becomes Liable (and Broke) Brian Fox and Tara Flynn Condon Governments around the world are making secure software development an organizational imperative. For instance, proposed regulations like the EU Cyber... 2 weeks ago | 29 mins Webinar: See what's new in the ARIS 10.0 SR22 release Dominik Vanderhaeghen, Product Management; Philip Hake, Julian.Krumeich, Cecilia Lauer, & Raviteja Avvari, Product Manager ARIS is the only tool in the market that offers true integration of process mining, process design, and risk and compliance management to cover the en... 2 weeks ago | 86 mins Application and Technology Portfolio Management Ali Rizvi, Product Manager Alfabet, Software AG As your business grows and takes on new challenges, IT is expected to keep pace with innovative business solutions. The result? Your IT portfolio expa... 2 weeks ago | 48 mins Unlocking the Power of Core-to-Edge Visibility, Automation & Control Bob Rose and Rod Dixon, Sr. Product Marketing Managers at Infoblox Network-wide visibility is essential for building a more responsive network with performance your business, users and customers depend on, whenever or... June 21, 2023 1:00am Unlocking the Power of Core-to-Edge Visibility, Automation & Control Bob Rose and Rod Dixon, Sr. Product Marketing Managers at Infoblox Network-wide visibility is essential for building a more responsive network with performance your business, users and customers depend on, whenever or... June 21, 2023 5:00pm Unlocking the Power of Core-to-Edge Visibility, Automation & Control Bob Rose and Rod Dixon, Sr. Product Marketing Managers at Infoblox Network-wide visibility is essential for building a more responsive network with performance your business, users and customers depend on, whenever or... June 21, 2023 9:00am Load more